XJDKC commented on PR #1506:
URL: https://github.com/apache/polaris/pull/1506#issuecomment-2852409287

   > @XJDKC - sorry, I know I had previously approved this proposal but reading 
through some of the comments, I'm questioning something:
   > 
   > Why do we require a IAM User for Polaris? My understanding is that today, 
Polaris already has access to some IAM Role credentials (through the Default 
Credential Provider) - why do we need to introduce the new complexity of an IAM 
User? If we assume that Polaris has access to the IAM Role, then we no longer 
need the workaround for cross-account access as well.
   > 
   > Can you clarify on this bit?
   > 
   > On non-STS SigV4 authN, I don't really have a strong preference - and I 
don't think adopting any of the options constitutes this PR as a one-way door. 
So I'm okay to punt on it for now.
   
   Hey @adnanhemani, there is an on-going discussion about this PR: 
https://lists.apache.org/thread/rlbxvw0xmzvlfm7pdh97bs3xvq7o8lmy
   
   This thread also contains some details about it: 
https://github.com/apache/polaris/pull/1506#discussion_r2070930235
   
   In short, to get an IAM Role credentials, polaris needs to use a long-lived 
credential (represents the polaris service identity) to assume the role 
(provided by polaris users) and get a temp credential. This is the solution 
provided by AWS IAM to grant permissions to AWS account B (polaris service 
provider) from AWS account A (polaris users).


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]

Reply via email to